A Reversible Data Hiding Scheme in Encrypted Domain for Secret Image Sharing Based on Chinese Remainder Theorem

نویسندگان

چکیده

Schemes of reversible data hiding in encrypted domain (RDH-ED) based on symmetric or public key encryption are mainly applied the scenarios end-to-end communication. To provide security guarantees for multi-party scenarios, a RDH-ED scheme secret image sharing Chinese remainder theorem (CRT) is presented. In application ( $t$ , notation="LaTeX">$n$ ) sharing, an first shared into different shares ciphertext. Only when not less than obtained, can be reconstructed. our scheme, additional could embedded shares. realize extraction from and reconstructed separably, two methods proposed: one homomorphic difference expansion (HDE-ED) that supports by utilizing addition homomorphism CRT sharing; other (DE-IS) marked before reconstruction. Experimental results demonstrate proposed only maintain threshold function system, but also obtain better reversibility efficiency compared with most existing algorithms. The maximum embedding rate HDE-ED reach 0.500 bits per pixel average DE-IS 0.4652 pixel.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Compartmented Secret Sharing Based on the Chinese Remainder Theorem

A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed to users. The secret may be recovered only by certain predetermined groups. In case of compartmented secret sharing, the set of users is partitioned into compartments and the secret can be recovered only if the number of participants from any compartment is greater than a fixe...

متن کامل

Weighted Secret Sharing Based on the Chinese Remainder Theorem

In a ) , ( n t secret sharing scheme (SS), a dealer divides a secret into n shares in such a way that (a) the secret can be recovered successfully with t or more than t shares, and (b) the secret cannot be recovered with fewer than t shares. In a weighted secret sharing scheme (WSS), each share of a shareholder has a positive weight. The secret can be recovered if the overall weight of shares i...

متن کامل

Weighted Threshold Secret Sharing Based on the Chinese Remainder Theorem

A secret sharing scheme derives from a given secret certain shares (or shadows) which are distributed to users. The secret can be recovered only by certain predetermined groups. In the first secret sharing schemes only the number of the participants in the reconstruction phase was important for recovering the secret. Such schemes have been referred to as threshold secret sharing schemes. In the...

متن کامل

General Secret Sharing Based on the Chinese Remainder Theorem

In this paper we extend the threshold secret sharing schemes based on the Chinese remainder theorem in order to deal with more general access structures. Aspects like verifiability, secret sharing homomorphisms and multiplicative properties are also discussed. AMS Subject Classification: 94A62, 11A07

متن کامل

Secret Sharing Extensions based on the Chinese Remainder Theorem

In this paper, we investigate how to achieve verifiable secret sharing (VSS) schemes by using the Chinese Remainder Theorem (CRT). We first show that two schemes proposed earlier are not secure from an attack where the dealer is able to distribute inconsistent shares to the users. Then we propose a new VSS scheme based on the CRT and prove its security. Using the proposed VSS scheme, we develop...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Circuits and Systems for Video Technology

سال: 2022

ISSN: ['1051-8215', '1558-2205']

DOI: https://doi.org/10.1109/tcsvt.2021.3081575